A security mechanism for diffusing RFID-Sensor networks

被引:0
|
作者
He, Jialiang [1 ]
Xu, Zhiqiang [2 ]
机构
[1] College of Information and Communication Engineering, Dalian Nationalities University, China
[2] Department of digital media technology, Sichuan College of Media and Communications, China
关键词
Compendex;
D O I
10.14257/ijunesst.2014.7.2.24
中图分类号
学科分类号
摘要
Sensor networks
引用
收藏
页码:263 / 274
相关论文
共 50 条
  • [1] Optimal deployment method of RFID sensor networks oriented to IoT-based manufacturing environment
    School of Mechatronics, Northwestern Polytechnical University, Xi'an
    710072, China
    Jisuanji Jicheng Zhizao Xitong, 4 (1040-1045): : 1040 - 1045
  • [2] An authentication protocol in a security layer for RFID smart tags
    Feldhofer, Martin
    Proc Mediterr Electrotech Conf MELECON, 1600, (759-762):
  • [3] An adaptive routing protocol associated with urban traffic control mechanism for vehicular sensor networks
    Su, Xin
    Moh, Sangman
    Chung, Ilyong
    Choi, Dongmin
    Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010, 2010, : 597 - 602
  • [4] A Security Scheme for Source-Location Privacy Protection in Wireless Sensor Networks by Selecting Phantom Nodes
    Xiaoguang Wei
    Qian Zhang
    Automatic Control and Computer Sciences, 2024, 58 (06) : 656 - 662
  • [5] Security lightweight RFID protocol for U-healthcare system
    Chen, Xiuqing, 1600, Trade Science Inc, 126,Prasheel Park,Sanjay Raj Farm House,Nr. Saurashtra Unive, Rajkot, Gujarat, 360 005, India (10):
  • [6] Security games for Vehicular networks
    Deutsche Telekom Laboratories, Ernst-Reuter-Platz 7, D-10587 Berlin, Germany
    Annu. Allerton Conf. Commun., Control., Comput., 1600, (244-251):
  • [7] Security in Cognitive Radio Networks
    Ren, Kui
    Zhu, Haojin
    Han, Zhu
    Poovendran, Radha
    IEEE NETWORK, 2013, 27 (03): : 2 - 3
  • [8] Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications
    Abdulghani, Hezam Akram
    Nijdam, Niels Alexander
    Konstantas, Dimitri
    IEEE Access, 2022, 10 : 131528 - 131554
  • [9] Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach
    Zheng, Tong-Xing
    Chen, Xin
    Wang, Chao
    Wong, Kai-Kit
    Yuan, Jinhong
    arXiv, 2022,
  • [10] IT security for energy networks in times of digitalization
    IT-Security für Energienetze in Zeiten der Digitalisierung
    Hutterer, Stephan (stephan.hutterer@sprecher-automation.com), 2017, Springer-Verlag Wien (134): : 461 - 462